Showing 401 - 420 results of 974 for search '"integer"', query time: 0.04s Refine Results
  1. 401

    Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos by Shu-ying Wang, Jian-feng Zhao, Xiao-yan Wang, Li-tao Zhang

    Published 2019-01-01
    “…Comparing with the corresponding integer-order hyperchaotic system, the fractional-order hyperchaos possesses higher complexity. …”
    Get full text
    Article
  2. 402

    Computation offloading and resource allocation strategy based on deep reinforcement learning by Feng ZENG, Zheng ZHANG, Zhigang CHEN

    Published 2023-07-01
    “…In order to expand the coverage and computing power of vehicle edge network, a computation offloading architecture was proposed for space-air-ground integrated vehicle network (SAGVN).With the consideration of the delay and energy consumption constraints of computing tasks, as well as the spectrum, computing and storage constraints in the SAGVN, the joint optimization problem of computation offloading decision and resource allocation was modeled as a mixed integer nonlinear programming problem.Based on the reinforcement learning method, the original problem was transformed into a Markov process, and a deep reinforcement learning algorithm was proposed to solve the problem.The proposed algorithm has the good convergence.The simulation results show that the proposed algorithm outperforms other algorithms in terms of task delay and success rate.…”
    Get full text
    Article
  3. 403

    A ranking hashing algorithm based on listwise supervision by Anbang YANG, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2019-05-01
    “…Recently,learning to hash technology has been used for the similarity search of large-scale data.It can simultaneous increase the search speed and reduce the storage cost through transforming the data into binary codes.At present,most ranking hashing algorithms compare the consistency of data in the Euclidean space and the Hamming space to construct the loss function.However,because the Hamming distance is a discrete integer value,there may be many data points sharing the same Hamming distance result in the exact ranking cannot be performed.To address this challenging issue,the encoded data was divided into several subspaces with the same length.Each subspace was set with different weights.The Hamming distance was calculated according to different subspace weights.The experimental results show that this algorithm can effectively sort the data in the Hamming space and improve the accuracy of the query compared with other learning to hash algorithms.…”
    Get full text
    Article
  4. 404

    Newton polytope of good symmetric polynomials by Nguyen, Duc-Khanh, Nguyen Thi Ngoc, Giao, Dang Tuan, Hiep, Do Le Hai, Thuy

    Published 2023-05-01
    “…We introduce a general class of symmetric polynomials that have saturated Newton polytope and their Newton polytope has integer decomposition property. The class covers numerous previously studied symmetric polynomials.…”
    Get full text
    Article
  5. 405

    Riemann–Roch for the ring $\mathbb{Z}$ by Connes, Alain, Consani, Caterina

    Published 2024-05-01
    “…The formula equates the (integer valued) Euler characteristic of an Arakelov divisor with the sum of the degree of the divisor (using logarithms with base 2) and the number $1$, thus confirming the understanding of the ring $\mathbb{Z}$ as a ring of polynomials in one variable over the absolute base $\mathbb{S}$, namely $\mathbb{S}[X], 1+1=X+X^2$.…”
    Get full text
    Article
  6. 406

    A New Technique of Laplace Variational Iteration Method for Solving Space-Time Fractional Telegraph Equations by Fatima A. Alawad, Eltayeb A. Yousif, Arbab I. Arbab

    Published 2013-01-01
    “…As a special case, the obtained solutions reduce to the solutions of standard telegraph equations of the integer orders.…”
    Get full text
    Article
  7. 407

    On the Existence of a Normal Trimagic Square of Order 16n by Can Hu, Jiake Meng, Fengchu Pan, Maoting Su, Shuying Xiong

    Published 2023-01-01
    “…Since there exist normal trimagic squares of orders 16, 32, and 48, we prove that there exists a normal trimagic square of order 16n for every positive integer n.…”
    Get full text
    Article
  8. 408

    Stability Analysis of Distributed Order Fractional Chen System by H. Aminikhah, A. Refahi Sheikhani, H. Rezazadeh

    Published 2013-01-01
    “…We first investigate sufficient and necessary conditions of stability of nonlinear distributed order fractional system and then we generalize the integer-order Chen system into the distributed order fractional domain. …”
    Get full text
    Article
  9. 409

    A Synchronous Optimization Model for Multiship Shuttle Tanker Fleet Design and Scheduling Considering Hard Time Window Constraint by Zhenfeng Jiang, Dongxu Chen, Zhongzhen Yang

    Published 2018-01-01
    “…In this paper, the shuttle tanker fleet scheduling problem is considered as a vehicle routing problem with hard time window constraints. A mixed integer programming model aiming at minimizing total transportation cost is proposed to model this problem. …”
    Get full text
    Article
  10. 410

    Function smoothing regularization for precision factorization machine annealing in continuous variable optimization problems by Katsuhiro Endo, Kazuaki Z. Takahashi

    Published 2025-02-01
    “…Solving continuous variable optimization problems by factorization machine quantum annealing (FMQA) demonstrates the potential of Ising machines to be extended as a solver for integer and real optimization problems. However, the details of the Hamiltonian function surface obtained by the factorization machine (FM) have been overlooked. …”
    Get full text
    Article
  11. 411

    Compton scattering from superstrings by Thales Azevedo, Daniel E. A. Matamoros, Gabriel Menezes

    Published 2025-01-01
    “…Abstract We propose a candidate Compton amplitude which is valid for any (integer) quantum spin and free from any spurious poles. …”
    Get full text
    Article
  12. 412

    Robust video watermarking algorithm for H.264/AVC based on texture feature by Wei-wei ZHANG, Ru ZHANG, Jian-yi LIU, Xin-xin NIU, Yi-xian YANG

    Published 2012-03-01
    “…On the basis of analyzing some existing video watermarking al ithms and combining with the new features of the H.264/AVC video coding standard,a new robust video watermarking algorithm based on texture feature was proposed.The proposed algorithm firstly performs the 4×4 integer discrete cosine transform on the current frame in purpose of identifying whether it is the texture block.Then the watermarking is embedded by adopting the way of differential energy for selecting the appropriate coefficients adaptively.The experimental result shows that the proposed algorithm has little impact on the video quality and bit-rate,moreover,its robustness can effectively resist the common attacks such as the gauss noise,low pass filter and re-coded performed on the video watermarking.…”
    Get full text
    Article
  13. 413

    Identity-based cloud storage integrity checking from lattices by Miaomiao TIAN, Chuang GAO, Jie CHEN

    Published 2019-04-01
    “…With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An identity-based cloud storage integrity checking scheme was proposed on the small integer solution problem over ideal lattices,and it was proven to be secure against the adaptive identity attacks of clouds in the random oracle model.To validate the efficiency of the scheme,extensive experiments were conducted to make performance-comparisons between the scheme and the existing two identity-based cloud storage integrity checking schemes.The experimental results show that the online tag-generation time and the proof-verification time of the scheme are respectively reduced by 88.32%~93.74% and 98.81%~99.73%.…”
    Get full text
    Article
  14. 414

    New Bounds on 2-Frameproof Codes of Length 4 by Penying Rochanakul

    Published 2020-01-01
    “…These digital fingerprints are generally denoted as codewords in Qn, where Q is an alphabet of size q and n is a positive integer. A 2-frameproof code is a code C such that any 2 codewords in C cannot form a new codeword under a particular rule. …”
    Get full text
    Article
  15. 415

    On the Rational Recursive Sequence xn+1=(A+∑i=0kαixn−i)/(B+∑i=0kβixn−i) by E. M. E. Zayed, M. A. El-Moneam

    Published 2007-01-01
    “…,x−1,x0 are arbitrary positive real numbers, while k is a positive integer number.…”
    Get full text
    Article
  16. 416

    Abel–Goncharov Type Multiquadric Quasi-Interpolation Operators with Higher Approximation Order by Ruifeng Wu

    Published 2021-01-01
    “…Error estimates indicate that our operators could provide the desired precision by choosing the suitable shape-preserving parameter c and a nonnegative integer m. Several numerical comparisons are carried out to verify a higher degree of accuracy based on the obtained scheme. …”
    Get full text
    Article
  17. 417

    Hyers–Ulam Stability for Quantum Equations of Euler Type by Douglas R. Anderson, Masakazu Onitsuka

    Published 2020-01-01
    “…In particular, we show a direct connection between quantum equations of Euler type and h-difference equations of constant step size h with constant coefficients and an arbitrary integer order. For equation orders greater than two, the h-difference results extend first-order and second-order results found in the literature, and the Euler-type q-difference results are completely novel for any order. …”
    Get full text
    Article
  18. 418

    The Normality Criteria of Meromorphic Functions Concerning Shared Fixed-Points by Wei Chen, Qi Yang, Wen-jun Yuan, Hong-gen Tian

    Published 2014-01-01
    “…We study the normality criteria of meromorphic functions concerning shared fixed-points; we obtain the following: Let ℱ be a family of meromorphic functions defined in a domain D and k≥2 a positive integer. For every f∈ℱ, all zeros of f are of multiplicity at least k+2 and all poles of f are multiple. …”
    Get full text
    Article
  19. 419

    Graph partition based mapping algorithm on multiprocessors for streaming applications by Qi TANG, Shang-feng WU, Jun-wu SHI, Ji-bo WEI

    Published 2016-06-01
    “…To take advantage of multiprocessor platform,it is a necessity to map tasks of the application properly onto different processors to exploit the concurrency in the application and thus meet the stringent timing requirements.Parallelism graph was proposed to quantify and model the concurrency among tasks of the application.An algorithm was also proposed to construct the parallelism graph based on the self-timed schedule and transform the mapping problem to a graph partitioning problem.The graph partitioning problem as a pure 0-1 integer linear programming model was further formulated and the ILP solver to find the optimal result.A lot of randomly generated synchronous dataflow graphs and a set of practical applications were used to evaluate the performance of the proposed method.The experimental results demonstrate that the proposed method outperforms available algorithms.…”
    Get full text
    Article
  20. 420

    4-REGULAR GRAPH OF DIAMETER 2 by Đỗ Như An, Nguyễn Đình Ái

    Published 2013-06-01
    “…The diameter of G is the greatest distance between any pair of vertices. Let n4 be maximum integer number so that there exists an 4-regular graph on n4 vertices of diameter 2. …”
    Get full text
    Article